Vulnerability Description
Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC driver the corresponding JDBC driver download address will be downloaded first, but this address will return a response page with complete error information when accessing a non-existent URL. Attackers can take advantage of this feature for SSRF.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Databasir Project | Databasir | 1.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/vran-dev/databasir/releases/tag/v1.0.2Release NotesThird Party Advisory
- https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6mExploitThird Party Advisory
- https://github.com/vran-dev/databasir/releases/tag/v1.0.2Release NotesThird Party Advisory
- https://github.com/vran-dev/databasir/security/advisories/GHSA-r8m9-r74j-vc6mExploitThird Party Advisory
FAQ
What is CVE-2022-24862?
CVE-2022-24862 is a vulnerability with a CVSS score of 7.7 (HIGH). Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Server-Side Request Forgery vulnerability. During the download verification process of a JDBC dr...
How severe is CVE-2022-24862?
CVE-2022-24862 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24862?
Check the references section above for vendor advisories and patch information. Affected products include: Databasir Project Databasir.